General

  • Target

    a9eec798087fd2cbb1968044963f675a480cf5f6867dfddd7108b5b073c84898

  • Size

    98KB

  • Sample

    210508-rf225d5rwn

  • MD5

    cd1a70fc9e006494a67c2e70981651c9

  • SHA1

    1dee7ceb1f8e915f7a62736eb60e1ef84e4c2933

  • SHA256

    a9eec798087fd2cbb1968044963f675a480cf5f6867dfddd7108b5b073c84898

  • SHA512

    50c34689b8249999480fa2889e84f06f5bf2683bef246ce5f898f907e92d9eb208744cba15a599a9a531b48ef987ffcd486909716d0fb056f02ef6431e067c37

Malware Config

Targets

    • Target

      a9eec798087fd2cbb1968044963f675a480cf5f6867dfddd7108b5b073c84898

    • Size

      98KB

    • MD5

      cd1a70fc9e006494a67c2e70981651c9

    • SHA1

      1dee7ceb1f8e915f7a62736eb60e1ef84e4c2933

    • SHA256

      a9eec798087fd2cbb1968044963f675a480cf5f6867dfddd7108b5b073c84898

    • SHA512

      50c34689b8249999480fa2889e84f06f5bf2683bef246ce5f898f907e92d9eb208744cba15a599a9a531b48ef987ffcd486909716d0fb056f02ef6431e067c37

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks